Chuck Leaver – Is Your SysSecOps Solution Really Flexible?

Written By Chuck Leaver


You will find that endpoints are all over. The device you read this on is an endpoint, whether it’s a desktop, laptop, tablet, or phone. The HEATING AND COOLING controller for your structure is an endpoint, presuming it’s linked to a network, and the WiFi access points and the security video cameras too. So is the connected automobile. So are the Web servers, storage servers, and Active Directory site servers in the data center. So are your IaaS/PaaS services in the cloud, where you are in control of bare-metal servers, VMware virtual machines, or containers operating on Windows and/or Linux.

They’re all end-points, and each and every one is necessary to manage.

They need to be handled from the IT side (from IT administrators, who ideally have suitable IT-level visibility of each linked thing like those security cameras). That management means ensuring they’re connected to the right network zones or VLANs, that their software applications and configurations are up to date, that they’re not creating a flood on the network with bad packets due to electrical faults etc.

Those endpoints also need to be handled from the security viewpoint by CISO groups. Every endpoint is a potential front door into the business network, which indicates the devices should be locked down – default passwords never used, all security patches applied, no unauthorized software applications installed on the device’s ingrained web server. (Kreb’s outlines how, in 2014, hackers broke into Target’s network via its A/C system.).

Systems and Security Operations.

Systems Security Operations, or SysSecOps, brings those 2 worlds together. With the best kind of SysSecOps state of mind, and tools that support the proper workflows, IT and security workers get the same data and can team up together. Sure, they each have different tasks, and react in a different way to problem signals, however they’re all managing the exact same endpoints, whether in the pocket, on the desk, in the energy closet, in the data center, or in the cloud.

Test Report from Ziften Zentih.

We were thrilled when the recently published Broadband-Testing report praised Zenith, Ziften’s flagship endpoint security and management platform, as being perfect for this type of scenario. To quote from the current report, “With its Zenith platform, Ziften has a solution that ticks all the SysSecOps boxes and more. Since its meaning of ‘endpoints’ extends into the Data Centre (DC) and the world of virtualisation, it is true blanket coverage.”.

Broadband-Testing is an independent testing center and service based in Andorra. They describe themselves as, “Broadband-Testing communicates with vendors, media, investment groups and VCs, experts and consultancies alike. Testing covers all elements of networking hardware and software, from ease of use and performance, through to significantly important elements such as device power consumption measurement.”

Back to versatility. With endpoints all over (once again, on the desk, in the utility closet, in the data center, or in the cloud), a SysSecOps-based endpoint security and management system need to go everywhere and do anything, at scale. Broadband-Testing wrote:

“The configuration/deployment choices and architecture of Ziften Zenith enable an extremely versatile release, on or off-premise, or hybrid. Agent implementation is simpleness itself with zero user requirements and no endpoint intrusion. Agent footprint is also minimal, unlike numerous endpoint security services. Scalability also seems excellent – the most significant consumer release to date is in excess of 110,000 endpoints.”

We cannot help but take pride in our product Zenith, and exactly what Broadband-Testing concluded:

“The development of SysSecOps – combining systems and security operations – is an uncommon moment in IT; a hype-free, good sense approach to refocusing on how systems and security are handled inside a business.

Secret to Ziften’s endpoint technique in this classification is total visibility – after all, how can you secure what you cannot see or have no idea is there in the first place? With its Zenith platform, Ziften has a product that ticks all the SysSecOps boxes and more.

Deployment is simple, specifically in a cloud-based situation as evaluated. Scalability likewise looks to be excellent – the greatest customer implementation to date remains in excess of 110,000 endpoints.

Data analysis options are substantial with a substantial amount of info available from the Ziften console – a single view of the whole endpoint infrastructure. Any object can be evaluated – e.g. Binaries, applications, systems – and, from a procedure, an action can be defined as an automated function, such as quarantining a system in the event of a potentially destructive binary being found. Several reports are predefined covering all areas of analysis. Alerts may be set for any occurrence. In addition, Ziften provides the idea of extensions for custom data collection, beyond the reach of many vendors.

And with its External API functionality, endpoint data gathered by Ziften can be shared with the majority of 3rd party applications, thereby including more value to a customer’s existing security and analytics infrastructure financial investment.

In general, Ziften has an extremely competitive offering in exactly what is an extremely worthwhile and emerging IT classification through SysSecOps that is extremely worthwhile of assessment.”.

We hope you’ll think about an assessment of Zenith, and will concur that when it concerns SysSecOps and endpoint security and management, we do tick all the boxes with the true blanket coverage that both your IT and CISO groups have actually been trying to find.